This publication constitutes the refereed lawsuits of the 4th ecu Workshop on Case-Based Reasoning, EWCBR-98, held in Dublin, eire, in September 1998.The forty-one revised complete papers provided have been rigorously chosen and reviewed for inclusion within the court cases. The contributions deal with the illustration and association of situations in case-bases, the review of case similarity, the effective retrieval of instances from huge case-bases, the difference of comparable case ideas to slot the present challenge, case studying and case-base upkeep, and the appliance of CBR know-how to real-world problems.

This ebook constitutes the completely refereed post-conference court cases of the thirteenth foreign convention on digital structures and Multimedia, VSMM 2007, held in Brisbane, Australia, in September 2007. The 18 revised complete papers offered have been rigorously reviewed and chosen from ninety seven preliminary submissions in the course of rounds of reviewing and development.

Declarative languages construct on sound theoretical bases to supply beautiful frameworks for program improvement. those languages were succe- absolutely utilized to a wide selection of real-world events together with database m- agement, lively networks, software program engineering, and decision-support platforms.

According to [12] AOL uses RSA Security’s SecurID hardware token. In order to log in, users have to type in a 6-digit-Code displayed by the token and changed every minute, in addition to their regular password. – A one-time-password token provided by Kobil Systems does not change the passwords periodically but on user request. Every time the user needs a password he has to push a button on the token [13]. – A third method is used by the Swedish SEB-bank. It uses a token-based challenge-response-system [14].

The Anti-Phishing Working Group (APWG), an association of ﬁnancial institutions, internet service providers, online-retailers, and other it-companies, is collecting information on Phishing incidents. The collected data is published in the monthly Phishing Activity Trends Report, which clearly shows the dramatical increase in Phishing attacks during the last few months (see Fig. 1). Another study conducted by Gartner showed that 57 million US citizens have already been victims of a Phishing attack.

Pn must set some parameters. They choose a large prime p so that p = 2q + 1 and q is also prime; they also pick one element g ∈ Z∗p of order q. Using the key generation protocol described in [6], players jointly generate a public key y = ni=1 yi . Each player Pi keeps her corresponding share αi of the private key and publishes yi = g αi . 2 Deck Generation Each card is represented by a value jointly computed by all players in Protocol 1. We ﬁrst explain what Protocol 1 does and then describe the protocol in detail.